Excel Spreadsheet Handler
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
recalc.pyexecutes the system binarysoffice(LibreOffice) in headless mode usingsubprocess.runto perform formula recalculations on Excel files.- [COMMAND_EXECUTION]: The skill automatically generates and writes a StarBasic macro file (Module1.xba) into the user's LibreOffice configuration directory (~/.config/libreoffice/or~/Library/Application Support/LibreOffice/) to enable recalculation functionality.- [PROMPT_INJECTION]: The skill processes untrusted Excel files viapandasandopenpyxl, creating a surface for indirect prompt injection where malicious content within spreadsheet cells could influence the agent's behavior during analysis. - Ingestion points:
pd.read_excel()andload_workbook()calls inSKILL.mdused for document analysis. - Boundary markers: No specific delimiters or instructions are provided to ensure the agent ignores potentially malicious text embedded within cells.
- Capability inventory: The skill possesses file system read/write access and the ability to execute system commands through the
recalc.pyscript. - Sanitization: No documented sanitization or validation of cell content is performed before processing.
Audit Metadata